Here is a BY DATE listing of '''upcoming conferences and training events''' that pertain to [[digital forensics]]. Some of these duplicate the generic [[conferences]], but have specific dates/locations for the upcoming conference/training event.

+

<b> The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv</b>

<b> Any requests for additions, deletions or corrections to this list should be sent by email to David Baker <i>(bakerd AT mitre.org)</i>. </b>

−

The terms SIM, smart card, and UICC have an unfortunate tendency to be used interchangeably. The UICC is hardware. A SIM is a software application. Generally speaking a smart card is a UICC running a SIM as well as possibly other applications.

+

== Calls For Papers ==

+

{| border="0" cellpadding="2" cellspacing="2" align="top"

+

|- style="background:#bfbfbf; font-weight: bold"

+

! Title

+

! Due Date

+

! Website

+

|-

+

|Journal of Digital Forensics, Security, and Law - Special Issue

+

|Jan 31, 2007

+

|http://www.jdfsl.org/call-for-papers.htm

+

|-

+

|USENIX Security Conference

+

|Feb 01, 2007

+

|http://www.usenix.org/events/sec07/cfp/

+

|-

+

|Fourth International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment

A typical SIM contains several categories of information. One is the actual identity of the card itself. The SIM needs to have a unique identity to the network. This allows the network to identify what sources the subscriber is entitled to, billing information, etc. A second category relates to the actual operation of the device. Information such as the last number called, or the length of the phone call can be stored. A third category of information is personalized information. Phonebooks or calendars fall into this category.

+

== On-going / Continuous Training ==

+

{| border="0" cellpadding="2" cellspacing="2" align="top"

+

|- style="background:#bfbfbf; font-weight: bold"

+

! Title

+

! Date/Location or Venue

+

! Website

+

|-

+

|Basic Computer Examiner Course

+

|Computer Forensic Training Online

+

|http://www.cftco.com

+

|-

+

|MaresWare Suite Training

+

|First full week every month, Atlanta, GA

+

|http://www.maresware.com/maresware/training/maresware.htm

+

|-

+

|Linux Data Forensics Training

+

|Distance Learning Format

+

|http://www.crazytrain.com/training.html

+

|-

+

|}

−

+

== Scheduled Training Courses ==

−

== Uses of SIMs ==

+

{| border="0" cellpadding="2" cellspacing="2" align="top"

−

+

|- style="background:#bfbfbf; font-weight: bold"

−

+

! Title

−

SIM cards can be used in any kind of device or situation where there is a need to authenticate the identity of a user. They are particularly useful when there is a need or desire to provide different types or levels of service to many users who have different configurations.

+

! Date/Location

−

+

! Website

−

The primary use of SIM cards in the United States is in cell phones. There are other uses as well. The US military issues smart cards as identification to its personnel. These cards are used to allow users to log into computers.

+

! Limitation

−

+

|-

−

Europe has seen a wider use of these cards. The credit and debit card industry has integrated this technology in their cards for years. Similarly, a number of European phone companies have used these as phone cards to use in public telephones. The card companies in the United States have evidently not seen enough fraud to have a business justification to switch to this technology. There is some speculation that American credit cards will use a future generation of the technology when the added robustness and security of the system will make more economic sense.

Revision as of 18:53, 24 January 2007

Here is a BY DATE listing of upcoming conferences and training events that pertain to digital forensics. Some of these duplicate the generic conferences, but have specific dates/locations for the upcoming conference/training event.

The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST) Any requests for additions, deletions or corrections to this list should be sent by email to David Baker (bakerd AT mitre.org).